<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Subhasis</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Subhasis"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Subhasis"/>
		<updated>2026-05-02T09:52:27Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136853</id>
		<title>User:Subhasis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136853"/>
				<updated>2012-10-01T03:30:04Z</updated>
		
		<summary type="html">&lt;p&gt;Subhasis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Introduction'''&lt;br /&gt;
&lt;br /&gt;
7 years of experience in Web Application Penetration Testing and Vulnerability Assessment, System &amp;amp; Network Layers Security Assessment, PCI Compliance Review and Assessment, CITRIX API and Client-Server Architecture Based Application Assessment, SAS 70 Audit, Android/iOS Mobile Application Assessments, Conduct App-Sec Training &amp;amp; OWASP Awareness Classes.&lt;br /&gt;
&lt;br /&gt;
'''Added Technical Skills'''&lt;br /&gt;
&lt;br /&gt;
•Develop test strategy and test plan documents with details of the test environments, test exclusions, interfaces, and test conditions for certification and application hosting.&lt;br /&gt;
&lt;br /&gt;
•Work closely with developers, client head and other team members if present throughout the audit executing test iterations, tracking / reporting results, troubleshooting and coordinating defect resolution.&lt;br /&gt;
&lt;br /&gt;
•Research and development in all aspects of information security application engineering with responsibility to assess and mitigate system security threat/risk throughout the program life cycle; define and validate application security requirements definition and analysis; implement secure systems.&lt;br /&gt;
&lt;br /&gt;
•Provide leadership and security subject matter expertise in support of all business applications, databases and Web-based software including custom application and third party vendor software databases.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Subhasis Choudhury&lt;br /&gt;
&lt;br /&gt;
mailto:subhasis.choudhury@owasp.org&lt;/div&gt;</summary>
		<author><name>Subhasis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136852</id>
		<title>User:Subhasis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136852"/>
				<updated>2012-10-01T03:25:49Z</updated>
		
		<summary type="html">&lt;p&gt;Subhasis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Introduction'''&lt;br /&gt;
&lt;br /&gt;
7 years of experience in Web Application Penetration Testing and Vulnerability Assessment, System &amp;amp; Network Layers Security Assessment, PCI Compliance Review and Assessment, CITRIX API and Client-Server Architecture Based Application Assessment, SAS 70 Audit, Android/iOS Mobile Application Assessments, Conduct App-Sec Training &amp;amp; OWASP Awareness Classes.&lt;br /&gt;
&lt;br /&gt;
'''Added Technical Skills'''&lt;br /&gt;
&lt;br /&gt;
•Develop test strategy and test plan documents with details of the test environments, test exclusions, interfaces, and test conditions for certification and application hosting.&lt;br /&gt;
&lt;br /&gt;
•Work closely with developers, client head and other team members if present throughout the audit executing test iterations, tracking / reporting results, troubleshooting and coordinating defect resolution.&lt;br /&gt;
&lt;br /&gt;
•Research and development in all aspects of information security application engineering with responsibility to assess and mitigate system security threat/risk throughout the program life cycle; define and validate application security requirements definition and analysis; implement secure systems.&lt;br /&gt;
&lt;br /&gt;
•Provide leadership and security subject matter expertise in support of all business applications, databases and Web-based software including custom application and third party vendor software databases.&lt;br /&gt;
&lt;br /&gt;
'''Contact'''&lt;br /&gt;
&lt;br /&gt;
mailto:subhasis.choudhury@owasp.org&lt;/div&gt;</summary>
		<author><name>Subhasis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136851</id>
		<title>User:Subhasis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136851"/>
				<updated>2012-10-01T03:21:47Z</updated>
		
		<summary type="html">&lt;p&gt;Subhasis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Introduction'''&lt;br /&gt;
&lt;br /&gt;
7 years of experience in Web Application Penetration Testing and Vulnerability Assessment, System &amp;amp; Network Layers Security Assessment, PCI Compliance Review and Assessment, CITRIX API and Client-Server Architecture Based Application Assessment, SAS 70 Audit, Android/iOS Mobile Application Assessments, Conduct App-Sec Training &amp;amp; OWASP Awareness Classes.&lt;br /&gt;
&lt;br /&gt;
'''Added Technical Skills'''&lt;br /&gt;
&lt;br /&gt;
•Develop test strategy and test plan documents with details of the test environments, test exclusions, interfaces, and test conditions for certification and application hosting.&lt;br /&gt;
&lt;br /&gt;
•Work closely with developers, client head and other team members if present throughout the audit executing test iterations, tracking / reporting results, troubleshooting and coordinating defect resolution.&lt;br /&gt;
&lt;br /&gt;
•Research and development in all aspects of information security application engineering with responsibility to assess and mitigate system security threat/risk throughout the program life cycle; define and validate application security requirements definition and analysis; implement secure systems.&lt;br /&gt;
&lt;br /&gt;
•Provide leadership and security subject matter expertise in support of all business applications, databases and Web-based software including custom application and third party vendor software databases.&lt;br /&gt;
&lt;br /&gt;
'''Contact'''&lt;br /&gt;
&lt;br /&gt;
subhasis.choudhury@owasp.org&lt;/div&gt;</summary>
		<author><name>Subhasis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136850</id>
		<title>User:Subhasis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=136850"/>
				<updated>2012-10-01T03:14:05Z</updated>
		
		<summary type="html">&lt;p&gt;Subhasis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Introduction'''&lt;br /&gt;
&lt;br /&gt;
7 years of experience in Web Application Penetration Testing and Vulnerability Assessment, System &amp;amp; Network Layers Security Assessment, PCI Compliance Review and Assessment, CITRIX API and Client-Server Architecture Based Application Assessment, SAS 70 Audit, Android/iOS Mobile Application Assessments, Conduct App-Sec Training &amp;amp; OWASP Awareness Classes.&lt;br /&gt;
&lt;br /&gt;
'''Added Technical Skills'''&lt;br /&gt;
&lt;br /&gt;
•Develop test strategy and test plan documents with details of the test environments, test exclusions, interfaces, and test conditions for certification and application hosting.&lt;br /&gt;
&lt;br /&gt;
•Work closely with developers, client head and other team members if present throughout the audit executing test iterations, tracking / reporting results, troubleshooting and coordinating defect resolution.&lt;br /&gt;
&lt;br /&gt;
•Research and development in all aspects of information security application engineering with responsibility to assess and mitigate system security threat/risk throughout the program life cycle; define and validate application security requirements definition and analysis; implement secure systems.&lt;br /&gt;
&lt;br /&gt;
•Provide leadership and security subject matter expertise in support of all business applications, databases and Web-based software including custom application and third party vendor software databases.&lt;/div&gt;</summary>
		<author><name>Subhasis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=130022</id>
		<title>User:Subhasis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Subhasis&amp;diff=130022"/>
				<updated>2012-05-17T05:57:40Z</updated>
		
		<summary type="html">&lt;p&gt;Subhasis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;7 years of experience in Web Application Security Audit, Source Code Review, Report Writing, Developing New Security Test Case and Providing Code Level Solutions to Developers.Also in Network Penetration Testing &amp;amp; Vulnerability Assessment, Security Reviews on Network Infrastructure Components , Selection, Implementation and Maintenance of Security software, Audit using automated Web Application Security Scanner and Report Analysis.&lt;br /&gt;
&lt;br /&gt;
Specialties&lt;br /&gt;
&lt;br /&gt;
Web Application Security Assessment, Network Penetration Testing &amp;amp; Vulnerability Assessment, Source Code Review, Root Cause Analysis, Developing New Security Templates&lt;/div&gt;</summary>
		<author><name>Subhasis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Blitz&amp;diff=130018</id>
		<title>OWASP Security Blitz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Blitz&amp;diff=130018"/>
				<updated>2012-05-17T03:26:26Z</updated>
		
		<summary type="html">&lt;p&gt;Subhasis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=About=&lt;br /&gt;
OWASP is starting a monthly security blitz where we will rally the security community around a particular topic.  The topic may be a vulnerability, defensive design approach, technology or even a methodology.  All members of the security community are encouraged to write blog posts, articles, patches to tools, videos etc in the spirit of the current monthly topic.  Our goal is to show a variety of perspectives on the topic from the different perspectives of builders, breakers and defenders.&lt;br /&gt;
&lt;br /&gt;
=How Can You Help?=&lt;br /&gt;
==Individual Experts==&lt;br /&gt;
As an individual please create material on the monthly security topic. If you have recently created material that is relevant to the month at hand then please link it in the section below.  As mentioned above, the goal is to have a variety of perspectives (builder, breaker, defender, policy, etc) and types of content (tools, docs, videos, code patches, etc)&lt;br /&gt;
&lt;br /&gt;
==Companies / Organizations / Universitites==&lt;br /&gt;
Please consider launching an internal awareness program to coincide with the security blitz. This will allow all of us to pool resources and maximize the impact of each month's topic.&lt;br /&gt;
&lt;br /&gt;
=Monthly Security Topics=&lt;br /&gt;
* 2012 - [https://www.owasp.org/index.php/OWASP_Security_Blitz#April_-_SQL_Injection April - SQL Injection]&lt;br /&gt;
* 2012 - [https://www.owasp.org/index.php/OWASP_Security_Blitz#May_-_Cross_Site_Scripting May - Cross Site Scripting]&lt;br /&gt;
* 2012 - June - Access Control&lt;br /&gt;
* 2012 - July - Mobile Security &lt;br /&gt;
* 2012 - August - Threat Modeling&lt;br /&gt;
&lt;br /&gt;
== Articles/Contributions/Updates==&lt;br /&gt;
Please add links to any stories, posts, articles, etc that are related to the current month&lt;br /&gt;
&lt;br /&gt;
===April - SQL Injection===&lt;br /&gt;
# [https://www.owasp.org/index.php/Query_Parameterization_Cheat_Sheet OWASP Parameterization Cheat Sheet]&lt;br /&gt;
# [http://thepowerofapostrophe.blogspot.in/ The Power of the Apostrophe blog] (funny)&lt;br /&gt;
# [https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet OWASP SQL Injection Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
===May - Cross Site Scripting===&lt;br /&gt;
# [https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet OWASP XSS Prevention Cheat Sheet] (Builder)&lt;br /&gt;
# [http://ha.ckers.org/xss.html XSS cheat sheet] (Breaker)&lt;br /&gt;
# [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] (Builder)&lt;br /&gt;
# [https://www.owasp.org/index.php/DOM_Based_XSS Dom Based XSS]&lt;br /&gt;
# [https://www.owasp.org/index.php?title=DOM_based_XSS_Prevention_Cheat_Sheet Dom Based XSS Prevention Cheat Sheet] (Builder)&lt;br /&gt;
# [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series AppSec Tutorial Project - Cross Site Scripting] ([http://www.youtube.com/watch?v=_Z9RQSnf8-g Video Link])&lt;br /&gt;
# [http://labs.neohapsis.com/2012/04/25/abusing-password-managers-with-xss/ Abusing Password Managers with XSS] (Breaker)&lt;br /&gt;
# [http://labs.neohapsis.com/2012/04/19/xss-shortening-cheatsheet/ XSS Shortening Cheat Sheet] (Breaker)&lt;/div&gt;</summary>
		<author><name>Subhasis</name></author>	</entry>

	</feed>